Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
Jan 17, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed three…
How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?
Recent data breaches have highlighted the critical need to improve guest Wi-Fi…
Russian Star Blizzard Targets WhatsApp Accounts in New Spear-Phishing Campaign
Jan 16, 2025Ravie LakshmananSpear Phishing / Threat Intelligence The Russian threat actor…
Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action
Jan 16, 2025The Hacker NewsCertificate Management / Compliance The digital world is…
Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
Jan 16, 2025Ravie LakshmananEndpoint Security / Ransomware Cybersecurity researchers have detailed an…
Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes
Jan 15, 2025Ravie LakshmananMalvertising / Malware Cybersecurity researchers have alerted to a…
North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains
Jan 15, 2025Ravie LakshmananBlockchain / Cryptocurrency Cybersecurity researchers have identified infrastructure links…
3 Actively Exploited Zero-Day Flaws Patched in Microsoft’s Latest Security Update
Microsoft kicked off 2025 with a new set of patches for a…
Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation
Jan 14, 2025Ravie LakshmananEndpoint Security / Vulnerability Microsoft has shed light on…


